SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Legal Considerations in an Online World 			Andrew Young and Raj Banerjee 1
Overview ,[object Object]
How is the internet regulated in Australia
Key arguments for and against regulation and censorship
Case Study: Labor governments Internet filter2
Legal and Ethical Considerations in an online world “as the new activities of the digital world are immature, some of the traditional quality of old media forms is initially lost, while new rules and know-how are only being invented” 	- PhillippeAigrain 3
How is the internet regulated in Australia Key online regulatory body = ACMA (Australian Communications and Media Authority) Act on complaints from users about offensive content Power to issue ‘takedown notices’ Maintain a blacklist of offensive/illegal websites 4
Defining ‘offensive content’ 5 Offensive and prohibited content is anything that ACMA decides falls under these categories: *refused classification, or classified X18+ *classified R18+, and not protected by an adult verification system *classified MA15+ and not protected by an adult verification system, where the user has paid to access the content
Other types of regulation In most cases these laws have not been appropriated from an offline sense into an online world. Are they compatible? Defamation Uses the pre-existing offline State and Federal defamation legislation Hate speech Racial Discrimination Act 1975 Copyright Australia adheres to the WIPO (World Intellectual Property Organization) treaty 6
Internet censorship – an unpopular idea? http://www.youtube.com/watch?v=-b7vdmFOxyg&feature=related 7
The Internet Censorship Debate Limitation and Protection VS Freedom and Vigilance
What Is ‘Clean Feed’? The Australian Federal Government is pushing forward with a plan to force Internet Service Providers [ISPs] to censor the Internet for all Australians. In accordance with the government’s plan, Stephen Conroy has announced the proposed introduction of “mandatory ISP-level filtering of Refused Classification (RC) –rated content.”
Why Filter ? It will limit access to some adult content by the general population. Internet users will be able to use a complaint system which will allow them to report offensive websites that can be blocked. Websites that teach crime and terrorism will be blocked.
This policy is an understandable desire to be protective of society, but technically I don’t think it’s a very effective move. This doesn't mean however that we could not, as a society, agree that certain kinds of information are societally unacceptable."                                             - Vint Cerf one of the founding fathers of the internet and Google's chief web evangelist
Do you think it should be up to a group of middle-aged, politically minded men, with noted conservative views to decide what is best for a medium used mostly by Generation X and Y?   Surely the power of censorship should be in the hands of the user, especially since there is no argument to be made that censorship will curb the propensity of illegal material.                                                            - Samuel Webster
[object Object]
 Mandatory filtering will not protect children from inappropriate content.
 Material that is 'refused classification' (RC) includes much more than child sexual abuse material
 There are free-speech concerns.,[object Object]

Weitere Àhnliche Inhalte

Was ist angesagt?

Internet censorship
Internet censorshipInternet censorship
Internet censorshipmateo davis
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronakRonak Karanpuria
 
SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...Chris Marsden
 
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...Chris Marsden
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorshipbecnicholas
 
Techinnovation
TechinnovationTechinnovation
TechinnovationJeffrey Hart
 
Lessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityLessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityFreedom House
 
International internet governance
International internet governanceInternational internet governance
International internet governanceJillian York
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorshipomid abbasi
 
Pornography on the Internet
Pornography on the Internet Pornography on the Internet
Pornography on the Internet yadith_
 
POLS 3620 Internet freedom
POLS 3620 Internet freedomPOLS 3620 Internet freedom
POLS 3620 Internet freedomroypong
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internetmoldovaictsummit2016
 
Censorship Regimes On The Chinese Internet
Censorship Regimes On The  Chinese InternetCensorship Regimes On The  Chinese Internet
Censorship Regimes On The Chinese InternetAnders Pedersen
 
Censorship on the Internet
Censorship on the InternetCensorship on the Internet
Censorship on the Internetno0orcom
 
Marsden Regulating Disinformation Kluge 342020
Marsden Regulating Disinformation Kluge 342020Marsden Regulating Disinformation Kluge 342020
Marsden Regulating Disinformation Kluge 342020Chris Marsden
 
China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...Emily VĂ”
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaUniversitas Pembangunan Panca Budi
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentationbollmanp
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentationmoralsus
 

Was ist angesagt? (20)

Internet censorship
Internet censorshipInternet censorship
Internet censorship
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronak
 
SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...
 
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
Techinnovation
TechinnovationTechinnovation
Techinnovation
 
Lessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityLessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber security
 
International internet governance
International internet governanceInternational internet governance
International internet governance
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
Pornography on the Internet
Pornography on the Internet Pornography on the Internet
Pornography on the Internet
 
POLS 3620 Internet freedom
POLS 3620 Internet freedomPOLS 3620 Internet freedom
POLS 3620 Internet freedom
 
Society Meets Social Media at reyerson-2015
Society Meets Social Media at reyerson-2015Society Meets Social Media at reyerson-2015
Society Meets Social Media at reyerson-2015
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internet
 
Censorship Regimes On The Chinese Internet
Censorship Regimes On The  Chinese InternetCensorship Regimes On The  Chinese Internet
Censorship Regimes On The Chinese Internet
 
Censorship on the Internet
Censorship on the InternetCensorship on the Internet
Censorship on the Internet
 
Marsden Regulating Disinformation Kluge 342020
Marsden Regulating Disinformation Kluge 342020Marsden Regulating Disinformation Kluge 342020
Marsden Regulating Disinformation Kluge 342020
 
China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentation
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentation
 

Andere mochten auch

Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminarsEmmanuel Arthur
 
Safer internet day mo i cpc 2 feb 2014sb
Safer internet day  mo i cpc 2 feb 2014sbSafer internet day  mo i cpc 2 feb 2014sb
Safer internet day mo i cpc 2 feb 2014sbSafeChildUAE1
 
Filtering for in and of on education
Filtering for in and of on educationFiltering for in and of on education
Filtering for in and of on educationCraig Cunningham
 
E safety live
E safety liveE safety live
E safety livebobbyelliott
 
Sacred Breath Manual
Sacred Breath ManualSacred Breath Manual
Sacred Breath Manualguest5f2eb86
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentationalexfinvle
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace Karnika Seth
 
censorship bme-1
censorship bme-1censorship bme-1
censorship bme-1prashant patel
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
C:\Documents And Settings\U Ser Xp\Desktop\Imp Neha\New Ppt Neha
C:\Documents And Settings\U Ser Xp\Desktop\Imp  Neha\New Ppt  NehaC:\Documents And Settings\U Ser Xp\Desktop\Imp  Neha\New Ppt  Neha
C:\Documents And Settings\U Ser Xp\Desktop\Imp Neha\New Ppt NehaRidhi Mehta
 
Women Safety by MBA Media Management , ASCO
Women Safety by MBA Media Management , ASCOWomen Safety by MBA Media Management , ASCO
Women Safety by MBA Media Management , ASCOGNRC Hospital
 
XCRI at IWMW 2007
XCRI at IWMW 2007XCRI at IWMW 2007
XCRI at IWMW 2007scottw
 
Internet Safety Communicating Openly
Internet Safety Communicating OpenlyInternet Safety Communicating Openly
Internet Safety Communicating Openlyjohnp
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guidemjtheman
 
The impact of online child abuse on families: Building knowledge and understa...
The impact of online child abuse on families: Building knowledge and understa...The impact of online child abuse on families: Building knowledge and understa...
The impact of online child abuse on families: Building knowledge and understa...Natalie Walker
 

Andere mochten auch (18)

Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
Safer internet day mo i cpc 2 feb 2014sb
Safer internet day  mo i cpc 2 feb 2014sbSafer internet day  mo i cpc 2 feb 2014sb
Safer internet day mo i cpc 2 feb 2014sb
 
Filtering for in and of on education
Filtering for in and of on educationFiltering for in and of on education
Filtering for in and of on education
 
E safety live
E safety liveE safety live
E safety live
 
Sacred Breath Manual
Sacred Breath ManualSacred Breath Manual
Sacred Breath Manual
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
 
censorship bme-1
censorship bme-1censorship bme-1
censorship bme-1
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
C:\Documents And Settings\U Ser Xp\Desktop\Imp Neha\New Ppt Neha
C:\Documents And Settings\U Ser Xp\Desktop\Imp  Neha\New Ppt  NehaC:\Documents And Settings\U Ser Xp\Desktop\Imp  Neha\New Ppt  Neha
C:\Documents And Settings\U Ser Xp\Desktop\Imp Neha\New Ppt Neha
 
Women Safety by MBA Media Management , ASCO
Women Safety by MBA Media Management , ASCOWomen Safety by MBA Media Management , ASCO
Women Safety by MBA Media Management , ASCO
 
Bihar State Report November-2016
Bihar State Report November-2016Bihar State Report November-2016
Bihar State Report November-2016
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
XCRI at IWMW 2007
XCRI at IWMW 2007XCRI at IWMW 2007
XCRI at IWMW 2007
 
Internet Safety Communicating Openly
Internet Safety Communicating OpenlyInternet Safety Communicating Openly
Internet Safety Communicating Openly
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
The impact of online child abuse on families: Building knowledge and understa...
The impact of online child abuse on families: Building knowledge and understa...The impact of online child abuse on families: Building knowledge and understa...
The impact of online child abuse on families: Building knowledge and understa...
 

Ähnlich wie Presentation slides

Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++Roxanne St Ives
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expressionGerwin Ocsena
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIJames Bollen
 
Research proposal
Research proposalResearch proposal
Research proposalSaba Afaq
 
Internet Censorship across the World
Internet Censorship across the WorldInternet Censorship across the World
Internet Censorship across the WorldNitine
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetDibussi Tande
 
The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismUniversity of Sydney
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislationTgarmon34
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Corso pisa-7 dh-2017
Corso pisa-7 dh-2017Corso pisa-7 dh-2017
Corso pisa-7 dh-2017Luca De Biase
 
How To Write An Introduction To A Research Paper
How To Write An Introduction To A Research PaperHow To Write An Introduction To A Research Paper
How To Write An Introduction To A Research PaperMichelle Brown
 
Internet access human_right essay sample from assignmentsupport.com essay wri...
Internet access human_right essay sample from assignmentsupport.com essay wri...Internet access human_right essay sample from assignmentsupport.com essay wri...
Internet access human_right essay sample from assignmentsupport.com essay wri...https://writeessayuk.com/
 

Ähnlich wie Presentation slides (12)

Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
Research proposal
Research proposalResearch proposal
Research proposal
 
Internet Censorship across the World
Internet Censorship across the WorldInternet Censorship across the World
Internet Censorship across the World
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
 
The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom Activism
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislation
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Corso pisa-7 dh-2017
Corso pisa-7 dh-2017Corso pisa-7 dh-2017
Corso pisa-7 dh-2017
 
How To Write An Introduction To A Research Paper
How To Write An Introduction To A Research PaperHow To Write An Introduction To A Research Paper
How To Write An Introduction To A Research Paper
 
Internet access human_right essay sample from assignmentsupport.com essay wri...
Internet access human_right essay sample from assignmentsupport.com essay wri...Internet access human_right essay sample from assignmentsupport.com essay wri...
Internet access human_right essay sample from assignmentsupport.com essay wri...
 

KĂŒrzlich hochgeladen

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

KĂŒrzlich hochgeladen (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Presentation slides

  • 1. Legal Considerations in an Online World Andrew Young and Raj Banerjee 1
  • 2.
  • 3. How is the internet regulated in Australia
  • 4. Key arguments for and against regulation and censorship
  • 5. Case Study: Labor governments Internet filter2
  • 6. Legal and Ethical Considerations in an online world “as the new activities of the digital world are immature, some of the traditional quality of old media forms is initially lost, while new rules and know-how are only being invented” - PhillippeAigrain 3
  • 7. How is the internet regulated in Australia Key online regulatory body = ACMA (Australian Communications and Media Authority) Act on complaints from users about offensive content Power to issue ‘takedown notices’ Maintain a blacklist of offensive/illegal websites 4
  • 8. Defining ‘offensive content’ 5 Offensive and prohibited content is anything that ACMA decides falls under these categories: *refused classification, or classified X18+ *classified R18+, and not protected by an adult verification system *classified MA15+ and not protected by an adult verification system, where the user has paid to access the content
  • 9. Other types of regulation In most cases these laws have not been appropriated from an offline sense into an online world. Are they compatible? Defamation Uses the pre-existing offline State and Federal defamation legislation Hate speech Racial Discrimination Act 1975 Copyright Australia adheres to the WIPO (World Intellectual Property Organization) treaty 6
  • 10. Internet censorship – an unpopular idea? http://www.youtube.com/watch?v=-b7vdmFOxyg&feature=related 7
  • 11. The Internet Censorship Debate Limitation and Protection VS Freedom and Vigilance
  • 12. What Is ‘Clean Feed’? The Australian Federal Government is pushing forward with a plan to force Internet Service Providers [ISPs] to censor the Internet for all Australians. In accordance with the government’s plan, Stephen Conroy has announced the proposed introduction of “mandatory ISP-level filtering of Refused Classification (RC) –rated content.”
  • 13. Why Filter ? It will limit access to some adult content by the general population. Internet users will be able to use a complaint system which will allow them to report offensive websites that can be blocked. Websites that teach crime and terrorism will be blocked.
  • 14. This policy is an understandable desire to be protective of society, but technically I don’t think it’s a very effective move. This doesn't mean however that we could not, as a society, agree that certain kinds of information are societally unacceptable." - Vint Cerf one of the founding fathers of the internet and Google's chief web evangelist
  • 15. Do you think it should be up to a group of middle-aged, politically minded men, with noted conservative views to decide what is best for a medium used mostly by Generation X and Y?   Surely the power of censorship should be in the hands of the user, especially since there is no argument to be made that censorship will curb the propensity of illegal material. - Samuel Webster
  • 16.
  • 17. Mandatory filtering will not protect children from inappropriate content.
  • 18. Material that is 'refused classification' (RC) includes much more than child sexual abuse material
  • 19.
  • 20. Internet censorship is a breach of the United Nations Universal Declaration on Human Rights – Hillary Clinton The question to ask is: “Who is putting that information out in the first place? That's the place to attack the problem.” – Vint Cerf
  • 21.  The antidote to bad information is more information – Esther Dyson
  • 22. What do you think? 17 To what extent, if at all, do you think the Internet should be regulated? 2. Do you agree with the need for a compulsory Internet filter?
  • 23. Bibliography Aigrain, P 2005, ‘Positive Intellectual Rights and Information Exchanges’ in R A Ghosh (ed), CODE: collaborative ownership and the digital economy, pp. 287-315, Cambridge, Mass: MIT Press. Âź Australian Human Rights Commission 2003, ‘Internet regulation in Australia’, [Online] Accessed at: http://www.hreoc.gov.au/racial_discrimination/cyberracism/regulation.html. Deibert, R et al 2010, Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace, Cambridge, MA: MIT Press, pp. 389-406 Âź Libertus, 2010, ‘Australia’s Internet Censorship System’ [Online] Accessed at: http://libertus.net/censor/netcensor.html. Levin, J 2010, ‘Internet Censorship: the debate rages on’, Screen Education, no. 59, pp. 46-51. Mitchell, D and Armstrong M 2001, ‘Broadcasting regulatory mechanisms and the internet’, Intermedia, vol. 29, no.5-6, pp. 8-12. 18
  • 24. Bibliography Don’t Be Dirty: Why Internet Censorship is About More Than Pornography - Samuel Webster– December 5, 2008 http://www.trespassmag.com/don%E2%80%99t-be-dirty-why-internet-censorship-is-about-more-than-pornography/ Vint Cerf's message to Australia: internet censorship isn't effective Australian IT, January 21, 2011 7 http://www.theaustralian.com.au/australian-it/vint-cerfs-message-to-australia-internet-censorship-isnt-effective/story-e6frgakx-1225992330849 NO CLEAN FEED – STOP INTERNET CENSORSHIP IN AUSTRALIA http://nocleanfeed.com/learn.html Internet Censorship - Is Australia the Next China? By mcbeanhttp://mcbean.hubpages.com/hub/Internet-Censorship-Australia-China